More example of argument and shell command injections in browser invocation

computer unix debian security shell vulnerability

In the previous episode, I talked about some argument and shell command injections vulnerabilities through URIs passed to browsers. Here I am evaluating some other CVEs which were registered at the same time (not by me).

Read more…

Verifying authenticity of Debian CDs

computer debian

The official guide for verifying the authenticity of a Debian 🍥 CD image is not so clear if you don't already have an idea about what you are doing. Here is a translation in terms of shell commands.

Read more…

Page 1 of 1 | | Next page | JSON Feed | Atom Feed